In this paper, the probabilistic behavior of plain concrete beams subjected to flexure is studied using a continuous mesoscale model. The model is two-dimensional where aggregate and mortar are treated as separate constituents having their own characteristic properties. The aggregate is represented as ellipses and generated under prescribed grading curves. Ellipses are randomly placed so it requires probabilistic analysis for model using the Monte Carlo simulation with 20 realizations to represent geometry uncertainty. The nonlinear behavior is simulated with an isotropic damage model for the mortar, while the aggregate is assumed to be elastic. The isotropic damage model softening behavior is defined in terms of fracture mechanics parameters. This damage model is compared with the fixed crack model in macroscale study before using it in the mesoscale model. Then, it is used in the mesoscale model to simulate flexure test and compared to experimental data and shows a good agreement. The probabilistic behavior of the model response is presented through the standard deviation, moment parameters and cumulative probability density functions in different loading stages. It shows variation of the probabilistic characteristics between pre-peak and post-peak behaviour of load-CMOD curves.
This Action research aimed at Assisting Students of Faculty of Educational Sciences at Al-Quds Open University to design computerized lessons using the Power Point software and according to ADDIE model. The study sample consisted of 40 students who were taking a course titled Technology of Education during the second semester of the 2014-2015 academic year and three academic instructors . To collect the required date , the researchers used focus group technique and structured interviews to get information from the 40 students and the three academic instructors involved in the course Technology of Education in QOU /Nablus Branch. In addition to these methods, a workshop with a guiding checklist was employed t
... Show MoreOne of the challenging issues encountered during drilling operations is the lost circulation. Numerous issues might arise because of losses, such as wasting of time and higher drilling cost. Several types of lost circulation materials have been developed and are being used to limit mud losses and avoid associated issues. Each solution has benefits and drawbacks.
In this study, a core flooding test was performed to study the effectiveness of polyacrylamide (PAM) granular gel on the reduction of the circulation lost. One common type of fracture characteristic is fractures with tips, commonly known as partially open fracture (POF). However, PAM gel therapy in POFs received little attention in prior research. Models of partly open fra
... Show MoreThis research dealt with shedding light on the nature of material misrepresentations, in addition to knowing the extent to which the quality of accounting information systems contributes to reducing material misrepresentations On the theoretical side, a number of sources were relied upon in dealing with the research problem and presentation of the topic, while in the practical side, it was relied on the questionnaire form, where the research sample was (accountants and auditors), where 50 forms were distributed and 50 were received, and the data was analyzed and hypotheses tested through the program Statistical spss to show the relationship between the variables. The research reached a number of conclusions, the most important of which is t
... Show MoreThe research aims to provide a method to measure the fair value of the most environmentally friendly of Iraq and through the application of method of measuring the fair value of the company garments contribute to mixed as the company is of the economic units of the industrial sector and included in the Iraqi market for securities as a profit and distributes profits to shareholders since the method of measurement of the fair value based on the divided profits as toxic in a deduction of Cash Dividends cash for measuring fair value, and will also be in this research to clarify the disclosure of accounting for fair value and choose the method of disclosure most appropriate to the beneficiaries of accounting disclosure, as will be cho
... Show MoreThis work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreGroundwater modelling is particularly challenging in arid regions where limited water recharge is available. A fault zone will add a significant challenge to the modelling process. The Western Desert in Iraq has been chosen to implement the modelling concept and calculate the model sensitivity to the changes in aquifer hydraulic properties and calibration by researching 102 observations and irrigation wells. MODFLOW-NWT, which is a Newtonian formulation for MODFLOW-2005 approaches, have been used in this study. Further, the simulation run has been implemented using the Upstream-Weighting package (UPW) to treat the dry cells. The results show sensitivity to the change of the Kx value for the major groundwater discharge flow. Only abo
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More